You are on page 1of 6
For more on cyber security see Chapter 2.3 Symmetric and asymmetric encryption 2.3 Symmetric and asymmetric encryption 2.3.1 The purpose of encryption When data is tranemitted over any pubic network (ted or wireless), there is always a isk of t being intercepted by, for example, a hacker. Under these ctcuntancee, 9 hacker is often referred to a an eavesdropper. Using ancryption helps to minimise this risk Encryption alters data into a form that is unreadable by anybody For whom the datas rot intended. It cannot prevent the data being incercented, but i stops it from making any sense tothe eavesdropper, This is particulary important ifthe ‘data is sensitive or confidential (for example, credit card/bank details, medical. history or legal documents). Plaintext and ciphertext The original data being sent is known as plaintext. Once it has gone through an encryption algorithm, it produces ciphertext: one crayon nr 1-0 Deerton cs ‘A. Figure 2.18 Plsintont ane cishertoxt 2.3.2Symmetric and asymmetric encryption ‘Symmetric encryption ‘Symmetric encryption uses an encryption key; the same key is used to encrypt and decrypt the encoded message. First ofall, consider a simple system that uses a 10-digit denary encryption key (this gives 1 » 10” possible codes): and a decryption key. Suppose our encryption key is: 4291362856 ‘hich means every letter in a word is shifted across the alphabet +4, +2, 49, +1, and so on, places. For example, here fs the message COMPUTER SCIENCE 15 EXCITING (plaintext on the top line of Figure 2.19) before and after applying the encryption key (forming the ciphertext shown on the bottom line of Figure 2.1}: “PEE EDEN EE) Ms] ERED ERT 2tefafefelzfel feleleletelale| [ele] fefelele fete f 2 VePdztel2| Elelstellere| fete) fells [e leer 44 Figure 2.19 Plaintet into ciphertent using 1-digit encryption key 2 DATA TRANSMISSION ne of the ways of ratigating he risk of Symmetric Keys falling into the wrang hands Iknown as the key distribution problem] istousea system ered en modulo") tnere both sender sd recenvercan calculate the encryption key writhout # actually being exchangesin any way-Find outhow this System works, To get back to the original message, it will be necessary to apply the same decryption key; that is, 42913 6 2 8 5 6. But in this case, the decryption ‘process would be the reverse of encryption and each letter would be shifted -4, ~2, =9, -1, and so on. For example, ‘G’ —~ 'C, ‘0’ ‘0, V = 'M, ‘OY, and However, modern computers could ‘crack’ this encryption key in a matter of seconds. To try to combat this, we now use 256-bit binary encryption keys that sive 2° (approximately, 1.2 x 10”) possible combinations. (Even this may not be ‘enough as we head towards quantum computers.) ‘The veal difficulty is keering the encryption key a secret (for example, it needs ‘to be sent in an email or a text message which can be intercepted). Therefore, the issue of security is always the main drawback of symmetrical encryption, since a single encryption key is required for bath sender and recipient. Asymmetric encryption Asymmetric encryption was developed to overcome the security problems associated with symmetric encryption. It makes use of two keys called the public key and the private key: >» public key (made available to everybody) >> private key (only known to the computer user). Both types of key are needed to encrypt and decrypt messages, We will use an example to explain how this works; suppase Tom and Jane work for the same company and Tom wishes to send a confidential document to Jane: 11 Jane uses an algorithm to generate a matching pair of keys (private and public) that they must keep stored on their computers; the matching pairs of keys ate mathematically Linked but can't be derived from each other. 2 Jane now sends her public key to Tom. hecoublc key | a 1A Figure 2.20 Jane sends Tom her public key 3 Tom now uses Jane's public key (+) to encrypt the document he wishes to send to her, He then sends his encrypted document (ciphertext) back to Jane, ean) .---- ee earner 1A Figure 2.21 Encrypted document sent from Tarn to ane 4. Jane uses her matching private key (-<) to unlock Tons document and ‘decrypt it; this works because the public key used to encrypt the document: and the private Key used to decrypt it ae a matching pair generated on Jane's Computer. Gane cart use the public key to decryst the message.) Activity 28 4) Althe moment jan can ony recsive encrypted docimants tom Ton Describe what would need topper for Jane tobe able to send encrypted ‘documents back to Tom. 2 Explain why this method is much more secure than symmetric encryption Jane can also exchange her public key with any number of people working in the company, so she is able to receive encrypted messages (which have been ‘encrypted using her public key =o) and she can then decrypt them using her ‘matching private key A Figure2.22 The sn 1 6t Jones pubic key However, if a two-way communication is required between all five workers, then they all need to generate their own matching public and private keys. Once this is done, all users then need to swap public keys so that they can send encrypted documents/files/messages between each other. Each worker will then use their ‘own private key to decrypt information being sent to them. 11 Using Figure 2.2225 your template, draw a new diagram showing the public keys and private kays that need tobe swapped f Jane wishes to Rave 2 two-way fexchange of encrypted document batwaen Tam, Susan, Mike ana Megan Consider the compli. ial five people want to have secure two-way. communication between each ater [and not just with Janel. This would mean each ofthe Five workers sharing their own public Keys with each ofthe cther workers ‘Activity 29 For each of the fllowing ten questions, choose which of the five options corresponds to the correct response. ‘2 What is meant by the term ciphertext when used in encryption? [Aan encryption or decrygtion algorithm B an encrypted message © atype of session key 1D another name for plaintext E text following an encryption algorithm 2 DATA TRANSMISSION When carrying out agymmetric eneryptin, which ofthe following users would beep the private key? ‘A the sender D allrecipents of the message B the receher none ofthe above both sender and receiver Inencryption, which of the following is the term used to describe the message before itis encrypted? A simpletext D ciphertext B plaintext E firsttent € notext Which of the following i the biggest disadvantage cf using symmetric encryption? A itis very complex and time consuming B itis rarely used anymore ( the value of the hey reads the same in both directions D it only works on computers with older operating systems EE there is a security problom when transmitting tha oncryption key Which of the following i the correct name fara form of encryption in which both the sender and the recipient use the same key to encrypl and decrypt? ‘A symmetric key eneryption D same key encryption B symmetric key encryation E block cipher encryption public key encryption |What ofthe following is the final number in a code, which is calculated from all the numbers in the code; its purpose is to find errors in data entry? ‘A parity check D parity bit B cheekeum E chock digit € cyclic redundancy check Which ofthe following i a farm of error detection that makes use of a system of acknowledgements and timeouts? A automatic repeat request D parity bit B echocheck E cyclic redundancy check © check digit Which of the following methods usos an extra bit added tea byteto encure it contains an even number af Is or o¢d number of 12? ‘A cyte redundaney cheek D check digit B parity check E echo check © checksum Which of the following uses a calculated value which is sent after a block of ata: the receiving computer also calculates the value from the block of data ‘and compares the values? A parity check D checksum B check digit E automaticrepeat request packet switching 2.3 Symmstric and asymmetric encryption |) Which ofthe following describes the check where the receiving computer sends back a copy of the data lo the sending computer toallow it to compare the data? A echo check 1 parity check B automatic repeat request E check digit © checksum Extension For those students considering the study of this subject at A Leva, the following section gwas some ineight into further study on eneryation. Quantum cryptography expioils the Laws of quantum mechanics to improve con the security of dats. Guantum cryptography is based on the use of particles of light called photons (with energy calculated according tothe formula: E = hi and their physical quantum preperties to preduce a virtually unbreakable encryption system. This helps protect the security of data being transmitted over fibre optic cables. The technology is based on the laws of physics, rather than mathematics which is how the current cryptography methods already covered in this chapter wark One ofthe uses of quantum cryptography is when sending encryption keys across {network this uses a Quantum Key Distribution {KD} protaco fone of the most common is called BBB4|. KD uses quantum mechanics to ensure @ secure transmission ol encryption keys. They use a Qubit [Quantum bitl whichis the basic unit of quantum ‘deta Unlike normal binary lwhich uses discrete Os and ts, the state of » Qubitis both 0 and 1 until the photon is measured. ‘A photon normally vibrates or oscillates in all different directions. Polarisation restricts these vibrations to particular directions. The following diagram shows how a photon can be polarised inane of twa bases -the rectilinear (up/down and side-to-side] basis and the dlagonal basis. 9 not worry too much about what {3 Gazle is - you can just think of them ae two different waye of preparing and ‘measuring the photon TE rior wim ian tsi Cy Lemons 1 + ‘Theeffect of four 0-0 te--0] R= fre oe == v Q ‘A. Figure 2.22 Quantum exyptagraphy 2 DATA TRANSMISSION.

You might also like